共 50 条
- [21] A Tale of Four Gates Privilege Escalation and Permission Bypasses on Android Through App Components COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 233 - 251
- [22] Risk measurement method for privilege escalation attacks on android apps based on process algebra Information (Switzerland), 2020, 11 (06):
- [23] Detecting Malware with Similarity to Android applications 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1249 - 1251
- [24] Preventing privilege escalation USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 231 - 241
- [25] Upgrading Your Android, Elevating My Malware: Privilege Escalation Through Mobile OS Updating 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 393 - 408
- [26] DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper) FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 260 - 268
- [28] Detecting GPS Information Leakage in Android Applications 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 826 - 831
- [29] Detecting Anomalous Energy Consumption in Android Applications PROGRAMMING LANGUAGES, SBLP 2014, 2014, 8771 : 77 - 91
- [30] Characterizing and Detecting Resource Leaks in Android Applications 2013 28TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2013, : 389 - 398